This topic describes how to select engines and configurations for a Lindorm instance. This topic also provides an overview of how to create, connect to, and use a Lindorm instance.
Select engines and configurations of a Lindorm instance
Before you create a Lindorm instance, select required configurations for the instance based on various factors, such as business scenarios, access loads, the access mode, and the capacity. For more information, see Select configurations for a Lindorm instance.
How to use a Lindorm instance
To get started with Lindorm, perform the steps shown in the following figure.
Step | Description |
Specify the instance information, such as specifications and storage, based on your business requirements. | |
Configure an IP address whitelist. Only the IP addresses in the whitelist can access the Lindorm instance. This prevents unauthorized access to the instance and improves database security. | |
You can connect to and use the Lindorm instance by using multiple methods, such as APIs, Cassandra Query Language (CQL), and shells. |